US7889735B2 - Method and apparatus for defending against denial of service attacks in IP networks based on specified source/destination IP address pairs - Google Patents
Method and apparatus for defending against denial of service attacks in IP networks based on specified source/destination IP address pairs Download PDFInfo
- Publication number
- US7889735B2 US7889735B2 US11/197,841 US19784105A US7889735B2 US 7889735 B2 US7889735 B2 US 7889735B2 US 19784105 A US19784105 A US 19784105A US 7889735 B2 US7889735 B2 US 7889735B2
- Authority
- US
- United States
- Prior art keywords
- address
- destination
- source
- pairs
- packets
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related, expires
Links
- 238000000034 method Methods 0.000 title claims abstract description 25
- 230000005540 biological transmission Effects 0.000 claims abstract description 32
- 238000004891 communication Methods 0.000 claims description 8
- 238000012544 monitoring process Methods 0.000 claims description 3
- 238000001914 filtration Methods 0.000 abstract description 4
- 238000013459 approach Methods 0.000 description 8
- 230000000903 blocking effect Effects 0.000 description 3
- 238000001514 detection method Methods 0.000 description 2
- 238000003745 diagnosis Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 230000007246 mechanism Effects 0.000 description 2
- 230000004044 response Effects 0.000 description 2
- 230000004888 barrier function Effects 0.000 description 1
- 230000001010 compromised effect Effects 0.000 description 1
- 238000007796 conventional method Methods 0.000 description 1
- 230000007123 defense Effects 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 230000015654 memory Effects 0.000 description 1
- 230000008450 motivation Effects 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 230000001681 protective effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/22—Arrangements for preventing the taking of data from a data transmission channel without authorisation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/141—Denial of service attacks against endpoints in a network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/146—Tracing the source of attacks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
- H04L63/0236—Filtering by address, protocol, port number or service, e.g. IP-address or URL
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
- H04L63/0263—Rule management
Definitions
- the present invention relates generally to the field of computer security in packet based communications networks such as Internet Protocol (IP) networks, and in particular to a method and apparatus for defending against Denial of Service attacks in such networks wherein a carrier network service provider of a target victim controls the routing of malicious packets based on a specification of source/destination IP address pairs which has been received automatically from the target victim itself to identify malicious packets.
- IP Internet Protocol
- the first approach requires manual identification of the existence of an attack by the end user (i.e., the target victim), followed by a manual (e.g., telephone) report of the attack to the victim's service provider (i.e., carrier), combined with a request that the carrier identify the source of the reported attack and instigate a protective barrier to prevent packets which are part of the attack from getting through the network to the victim.
- the carrier i.e., carrier
- Most typically, such an approach will result in the carrier identifying the source of the offending packets, followed by its refusal to accept any packets from that source (or at least any packets from that source which are destined for the particular attack victim which identified and reported the existence of the attack).
- a second approach for defending against such Denial of Service attacks provides a more automated process which requires the service provider to include sophisticated “packet washer” or “scrubber” filters through which each and every packet destined for the end user to be protected must pass. That is, changes are made to the Internet routing tables so that all of the given end user's traffic is routed through such a filter, which examines each packet in turn in an attempt to decide whether the packet is malicious or not. If it does not appear to be malicious, it is forwarded on to the end user, but if it does appear to be malicious, it is filtered out and discarded.
- the first approach requires substantial manual intervention and often may not be capable of addressing the problem of an attack until significant damage has already been done.
- the second approach is unable to leverage application analysis of packets, since often, only the target is able to extract, and thus analyze, the data contents of the packet. (For example, if cryptographic protocols are used, it is typically only the ultimate destination of the packet that is capable of decoding the encoded packet data.)
- a leveraged attack on a victim's application may not be based only on excessive bandwidth, but rather, may result from certain types of functional requests.
- a solution to the problem of Denial of Service attacks is needed wherein the attacks are promptly recognized, identified, and (preferably without manual intervention) stopped.
- the present invention provides a method and apparatus for defending against a Denial of Service attack wherein a carrier network which serves a given target victim limits transmission of malicious packets from a source to the target victim based on automated instructions from the target victim to do so.
- the target victim is assumed to have recognized the existence of an attack, identified the source of the attack, and automatically indicated to the carrier network how to identify the malicious packets based on specified source/destination IP address pairs.
- the present invention provides a method and apparatus for defending against Denial of Service attacks against a target victim, which is implemented in an Internet Protocol (IP) based carrier network which provides packet based communication services to the victim.
- IP Internet Protocol
- the inventive method comprises the steps of (or means for) receiving an automated indication from the victim alleging that a Denial of Service attack is being perpetrated; receiving from the victim one or more pairs of IP addresses comprising a source IP address and a destination IP address (where the destination IP address is one of the IP addresses associated with the victim); monitoring IP packet traffic through the network to identify IP packets having a source IP address and a destination IP address which match the source IP address and the destination IP address of one of the pairs of IP addresses received from the victim; and limiting (e.g., blocking) transmission of the identified IP packets (i.e., those having a source IP address and a destination IP address which matches the source IP address and the destination IP address of one of the pairs of IP addresses received from said victim).
- IP Internet Protocol
- FIG. 1 shows a network environment in which an apparatus for defending against Denial of Service attacks in accordance with an illustrative embodiment of the present invention is employed.
- FIG. 2 shows a flow chart of a method for defending against Denial of Service attacks in accordance with an illustrative embodiment of the present invention.
- a Zombie Attack Processor provides a new type of security device that allows the victim of a Denial of Service attack to “push back” by denouncing attackers to its carrier, which will, in response, update a table of source/destination IP address pairs which are to be blocked. More specifically, upon recognizing that an attack is taking place, the victim will identify one or more pairs of source and destination IP addresses which are specified in packets deemed to be a part of the attack, and communicate those IP address pairs to its carrier for blocking.
- the attacker i.e., the identified source IP address or addresses
- the victim i.e., the identified destination IP address or addresses
- This may be advantageous, particular in the case where the identified source IP address or addresses represent a legitimate user which has been taken over (i.e., a zombie) for the given attack against the victim.
- the owner of the taken over machine may continue to use the system for legitimate purposes, while the attack being perpetrated on the victim (unbeknownst to the legitimate user) is nonetheless advantageously thwarted.
- the technique in accordance with such illustrative embodiments of the present invention also advantageously provides protection from overly zealous identification of attackers by a given victim. Since, in accordance with the principles of the present invention, the identification of an attack is left to the discretion of the apparent victim, it is clearly advantageous that only traffic to the given victim is being cut off or restricted.
- the denunciation protocol could include security signatures so that the Zapper infrastructure itself could not be used to launch a Denial of Service attack.
- the protocol might advantageously make use of redundant connections to the carrier network, as well as redundant UDP (User Datagram Protocol), to ensure delivery even under congested network conditions.
- UDP User Datagram Protocol
- Advances in network processors and memories enable such a defense to be scaled to potentially large numbers of attackers—far beyond the capacity of earlier routers—advantageously without requiring manual intervention by either the victim or the carrier and hence capable of an extremely timely response.
- such a Zapper filtering engine may be implemented as either a stand-alone box included in the carrier network, or, alternatively, as a line card incorporated into otherwise conventional network elements which are already present in the network.
- the Zapper filter may be advantageously deployed by the carrier within the network at a location relatively close to the attack origins, or it may be initially placed to advantageously defend premium customers from attack.
- IP address pair entries to be blocked may either time out (i.e., be automatically removed after a predetermined elapsed period of time), or, alternatively, may be cleared by explicitly issued reprieves. In this manner, the network will advantageously return to a clean state without the need for the use of garbage collection algorithms.
- denouncers i.e., customers of the carrier network who are enabled to identify and protect against attacks
- chits source/destination IP address pairs to be entered and blocked
- network diagnosis may be advantageously provided by having the illustrative Zapper return an ICMP (Internet Control Message Protocol, fully familiar to those of ordinary skill in the art) unreachable message with, for example, some predetermined probability whenever a packet is dropped as having been identified as comprising a blocked source/destination IP address pair.
- ICMP Internet Control Message Protocol
- Such an error return may, in accordance with one illustrative embodiment of the present invention, include a code which will enable the sender of the blocked packet to query a database for details regarding who placed the blocking request on such packets and, possibly, the reasons for such a request.
- supplementary tools might be advantageously provided as well.
- such tools might include Internet server plug-ins for recognition of leveraged Denial of Service attacks, links to various IDS systems (Intrusion Detection Systems), databases for network diagnosis (see discussion above), and methods for providing guidance for placement of Zapper functionality within a given carrier's infrastructure.
- IDS systems Intrusion Detection Systems
- databases for network diagnosis (see discussion above)
- methods for providing guidance for placement of Zapper functionality within a given carrier's infrastructure Illustrative embodiments of the present invention which provide various ones of these supplementary tools will be obvious to those skilled in the art in light of the disclosure herein.
- the operation of the Zapper filtering mechanism is similar to that of a conventional firewall, except that it operates based on a potentially large number (e.g., millions) of very simple rules.
- the Zapper rules may be expressed in the form “if the source IP address of a given packet is a.b.c.d and the destination IP address of the packet is w.x.y.z, then block (i.e., drop) the packet.”
- the Zapper filter may de-prioritize such packets. That is, the filtering mechanism may either assign such packets a low routing priority or enforce a packet rate limit on such packets. In either case, packets with the given source and destination IP addresses will be unable to have a significant effect on traffic and thus will no longer result in a successful Denial of Service attack on the victim.
- attack detection may be advantageously recognized by the victim by algorithms of varying degrees of simplicity or sophistication, many of which will be obvious to those skilled in the art.
- application logs may be examined and an attack may be identified based solely on the presence of very high traffic levels (e.g., high packet rates) from either a single identified source or a plurality of identified sources. (Note that this is one conventional method of identifying the presence of a Denial of Service attack and will be familiar to those of ordinary skill in the art.)
- application based analysis of packet contents may be performed to identify packets or sequences of packets having a suspicious nature, such as, for example, recognizing that there have been frequent database searches for non-existent database elements; recognizing that there have been multiple requests apparently from a human being which occur at a higher rate than a person could initiate them; identifying syntactically invalid requests; and identifying suspicious amounts of traffic at particularly sensitive times in the operation of a normally occurring activity.
- FIG. 1 shows a network environment in which an illustrative apparatus for defending against Denial of Service attacks in accordance with an illustrative embodiment of the present invention is employed.
- the figure shows target victim 11 (which may, for example, be a bank or other financial institution). Note that target victim 11 is assumed to have one or more IP addresses (not shown) associated therewith.
- attack detector 12 Also associated with target victim 11 , in accordance with the principles of the present invention, is attack detector 12 , which operates in accordance with an illustrative embodiment of the present invention to determine that a Denial of Service attack is being perpetrated on target victim 11 .
- Carrier network 13 the network carrier which provides service to target victim 11 , receives IP packets from various sources and transmits them to target victim 11 . As is shown in the figure, the IP packets being transmitted to the victim are, in fact, associated with a Denial of Service attack thereon, and are being sent by a large number of zombie machines 14 . Carrier network 13 also includes zapper 15 , which advantageously defends against Denial of Service attacks in accordance with an illustrative embodiment of the present invention.
- zapper 15 receives from attack detector 12 , upon determining that a Denial of Service attack is being perpetrated on target victim 11 , one or more source/destination IP address pairs.
- carrier network 13 advantageously limits (e.g., blocks) the transmission of IP packets whose source IP address and destination IP address match those of any of the received source/destination IP address pairs, thereby limiting (or eliminating) the Denial of Service attack from zombies 14 to attack victim 11 .
- zapper 15 advantageously receives the source/destination IP address pairs from attack detector 12 through redundant connection 17 .
- IP packets transmitted from zombies 14 to unrelated servers 16 are advantageously not affected.
- FIG. 2 shows a flow chart of a method for defending against Denial of Service attacks in accordance with an illustrative embodiment of the present invention.
- the illustrative method of FIG. 2 is performed at a network carrier which serves a given target victim and begins (as shown in block 21 ) by receiving an indication that a Denial of Service attack is being perpetrated on the given target victim. Then (as shown in block 22 ), the network carrier receives one or more source/destination IP address pairs representative of IP packets that should be blocked in order to thwart the Denial of Service attack.
- the source IP addresses are those of the attacking “zombie” machines and the destination IP addresses are those associated with the target victim itself.
- the network carrier monitors the IP packet traffic to identify IP packets whose source and destination IP addresses match one of the received source/destination IP address pairs. And finally (as shown in block 24 ), the network carrier blocks the identified IP packets, thereby thwarting the Denial of Service attack on the target victim.
- IP Internet Protocol
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Computer And Data Communications (AREA)
Abstract
Description
Claims (20)
Priority Applications (7)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/197,841 US7889735B2 (en) | 2005-08-05 | 2005-08-05 | Method and apparatus for defending against denial of service attacks in IP networks based on specified source/destination IP address pairs |
KR1020077030525A KR101217647B1 (en) | 2005-08-05 | 2006-08-02 | Method and apparatus for defending against denial of service attacks in IP networks based on specified source/destination IP address pairs |
JP2008525173A JP4768021B2 (en) | 2005-08-05 | 2006-08-02 | Method of defending against DoS attack by target victim self-identification and control in IP network |
CN2006800237398A CN101213812B (en) | 2005-08-05 | 2006-08-02 | Method for defending against denial of service attacks in IP networks by target victim self-identification and device |
AT06789264T ATE544283T1 (en) | 2005-08-05 | 2006-08-02 | METHOD FOR DEFENSE AGAINST DENIAL OF SERVICE ATTACKS ON IP NETWORKS USING TARGET VICTIM SELF-IDENTIFICATION AND CONTROL |
EP06789264A EP1911243B1 (en) | 2005-08-05 | 2006-08-02 | Method for defending against denial of service attacks in ip networks by target victim self-identification and control |
PCT/US2006/030207 WO2007019213A1 (en) | 2005-08-05 | 2006-08-02 | Method for defending against denial of service attacks in ip networks by target victim self-identification and control |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/197,841 US7889735B2 (en) | 2005-08-05 | 2005-08-05 | Method and apparatus for defending against denial of service attacks in IP networks based on specified source/destination IP address pairs |
Publications (2)
Publication Number | Publication Date |
---|---|
US20070030850A1 US20070030850A1 (en) | 2007-02-08 |
US7889735B2 true US7889735B2 (en) | 2011-02-15 |
Family
ID=37440673
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/197,841 Expired - Fee Related US7889735B2 (en) | 2005-08-05 | 2005-08-05 | Method and apparatus for defending against denial of service attacks in IP networks based on specified source/destination IP address pairs |
Country Status (7)
Country | Link |
---|---|
US (1) | US7889735B2 (en) |
EP (1) | EP1911243B1 (en) |
JP (1) | JP4768021B2 (en) |
KR (1) | KR101217647B1 (en) |
CN (1) | CN101213812B (en) |
AT (1) | ATE544283T1 (en) |
WO (1) | WO2007019213A1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130263256A1 (en) * | 2010-12-29 | 2013-10-03 | Andrew B. Dickinson | Techniques for protecting against denial of service attacks near the source |
Families Citing this family (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7747244B2 (en) * | 2003-01-23 | 2010-06-29 | Research In Motion Limited | Methods and apparatus for re-establishing communication for a wireless communication device after a communication loss in a wireless communication network |
US7661136B1 (en) * | 2005-12-13 | 2010-02-09 | At&T Intellectual Property Ii, L.P. | Detecting anomalous web proxy activity |
US8327297B2 (en) | 2005-12-16 | 2012-12-04 | Aol Inc. | User interface system for handheld devices |
US20070157316A1 (en) * | 2005-12-30 | 2007-07-05 | Intel Corporation | Managing rogue IP traffic in a global enterprise |
US8646038B2 (en) * | 2006-09-15 | 2014-02-04 | Microsoft Corporation | Automated service for blocking malware hosts |
US8898276B1 (en) * | 2007-01-11 | 2014-11-25 | Crimson Corporation | Systems and methods for monitoring network ports to redirect computing devices to a protected network |
JP4877107B2 (en) * | 2007-07-06 | 2012-02-15 | ブラザー工業株式会社 | Terminal device and information processing program in information distribution system, and information processing method of terminal device |
US8588056B1 (en) * | 2009-04-15 | 2013-11-19 | Sprint Communications Company L.P. | Elimination of unwanted packets entering a restricted bandwidth network |
US9148376B2 (en) | 2010-12-08 | 2015-09-29 | AT&T Intellectual Property I, L.L.P. | Method and system for dynamic traffic prioritization |
US8644177B2 (en) | 2010-12-16 | 2014-02-04 | Blackberry Limited | Methods and apparatus for use in controlling data traffic for a wireless mobile terminal using a wireless access point (AP) |
CN105741510A (en) * | 2016-03-17 | 2016-07-06 | 云丁网络技术(北京)有限公司 | Intelligent alarm method based on wireless signal and intelligent alarm system thereof |
US11750622B1 (en) | 2017-09-05 | 2023-09-05 | Barefoot Networks, Inc. | Forwarding element with a data plane DDoS attack detector |
US11108812B1 (en) | 2018-04-16 | 2021-08-31 | Barefoot Networks, Inc. | Data plane with connection validation circuits |
CN110535844B (en) * | 2019-08-20 | 2021-09-28 | 北京网思科平科技有限公司 | Malicious software communication activity detection method, system and storage medium |
CN115514501B (en) * | 2021-06-03 | 2024-07-02 | 中国移动通信集团四川有限公司 | A method and device for blocking network attacks |
CN113452692A (en) * | 2021-06-24 | 2021-09-28 | 北京卫达信息技术有限公司 | Method for defending network attack |
Citations (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5198607A (en) * | 1992-02-18 | 1993-03-30 | Trw Inc. | Laser anti-missle defense system |
US5907485A (en) * | 1995-03-31 | 1999-05-25 | Sun Microsystems, Inc. | Method and apparatus for flow control in packet-switched computer system |
US20020032854A1 (en) * | 2000-09-12 | 2002-03-14 | Chen Eric Yi-Hua | Distributed denial of service attack defense method and device |
US20020032793A1 (en) * | 2000-09-08 | 2002-03-14 | The Regents Of The University Of Michigan | Method and system for reconstructing a path taken by undesirable network traffic through a computer network from a source of the traffic |
WO2002025402A2 (en) | 2000-09-20 | 2002-03-28 | Bbnt Solutions Llc | Systems and methods that protect networks and devices against denial of service attacks |
US20020118644A1 (en) * | 2000-09-01 | 2002-08-29 | Ian Moir | Method and system to implement policy-based network traffic management |
US20020138599A1 (en) * | 2001-03-21 | 2002-09-26 | Mark Dilman | Method and apparatus for efficient Reactive monitoring |
WO2003001333A2 (en) | 2001-06-20 | 2003-01-03 | Arbor Networks, Inc., | Detecting network misuse |
WO2003005666A2 (en) | 2001-07-03 | 2003-01-16 | Intel Corporation | An apparatus and method for secure, automated response to distributed denial of service attacks |
US20030037141A1 (en) | 2001-08-16 | 2003-02-20 | Gary Milo | Heuristic profiler software features |
US6594268B1 (en) * | 1999-03-11 | 2003-07-15 | Lucent Technologies Inc. | Adaptive routing system and method for QOS packet networks |
US6611521B1 (en) * | 1998-07-14 | 2003-08-26 | International Business Machines Corporation | Data link layer extensions to a high latency wireless MAC protocol |
US20040054925A1 (en) * | 2002-09-13 | 2004-03-18 | Cyber Operations, Llc | System and method for detecting and countering a network attack |
US6834037B2 (en) | 2000-03-10 | 2004-12-21 | Telefonaktiebolaget Lm Ericsson | Method and arrangement in a telecommunication system |
US20050050364A1 (en) * | 2003-08-26 | 2005-03-03 | Wu-Chang Feng | System and methods for protecting against denial of service attacks |
US20050157647A1 (en) * | 2004-01-21 | 2005-07-21 | Alcatel | Metering packet flows for limiting effects of denial of service attacks |
US20050216955A1 (en) * | 2004-03-25 | 2005-09-29 | Microsoft Corporation | Security attack detection and defense |
US20060077964A1 (en) * | 2004-10-07 | 2006-04-13 | Santera Systems, Inc. | Methods and systems for automatic denial of service protection in an IP device |
US20060098585A1 (en) * | 2004-11-09 | 2006-05-11 | Cisco Technology, Inc. | Detecting malicious attacks using network behavior and header analysis |
US20060156407A1 (en) | 2002-09-30 | 2006-07-13 | Cummins Fred A | Computer model of security risks |
US20060174130A1 (en) | 2003-06-28 | 2006-08-03 | Noble Gary P | Identification system and method |
US7197009B1 (en) * | 2002-03-06 | 2007-03-27 | Sprint Communications Company L.P. | Delay variation based routing in communication systems |
US7301899B2 (en) * | 2001-01-31 | 2007-11-27 | Comverse Ltd. | Prevention of bandwidth congestion in a denial of service or other internet-based attack |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2001057554A (en) * | 1999-08-17 | 2001-02-27 | Yoshimi Baba | Cracker monitor system |
JP2002073433A (en) * | 2000-08-28 | 2002-03-12 | Mitsubishi Electric Corp | Break-in detecting device and illegal break-in measures management system and break-in detecting method |
JP3876687B2 (en) * | 2001-10-30 | 2007-02-07 | ソニー株式会社 | COMMUNICATION PROCESSING DEVICE, COMMUNICATION PROCESSING METHOD, AND COMPUTER PROGRAM |
KR100523483B1 (en) * | 2002-10-24 | 2005-10-24 | 한국전자통신연구원 | The system and method of malicious traffic detection and response in network |
KR100502068B1 (en) * | 2003-09-29 | 2005-07-25 | 한국전자통신연구원 | Security engine management apparatus and method in network nodes |
JP2005130190A (en) * | 2003-10-23 | 2005-05-19 | Nippon Telegr & Teleph Corp <Ntt> | Defense system for attack packet |
JP3784799B2 (en) * | 2003-11-13 | 2006-06-14 | 日本電信電話株式会社 | Attack packet protection system |
KR100609684B1 (en) * | 2003-12-26 | 2006-08-08 | 한국전자통신연구원 | Denial of service attack prevention device in network system and its method |
-
2005
- 2005-08-05 US US11/197,841 patent/US7889735B2/en not_active Expired - Fee Related
-
2006
- 2006-08-02 EP EP06789264A patent/EP1911243B1/en not_active Not-in-force
- 2006-08-02 JP JP2008525173A patent/JP4768021B2/en not_active Expired - Fee Related
- 2006-08-02 CN CN2006800237398A patent/CN101213812B/en not_active Expired - Fee Related
- 2006-08-02 KR KR1020077030525A patent/KR101217647B1/en not_active Expired - Fee Related
- 2006-08-02 AT AT06789264T patent/ATE544283T1/en active
- 2006-08-02 WO PCT/US2006/030207 patent/WO2007019213A1/en active Application Filing
Patent Citations (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5198607A (en) * | 1992-02-18 | 1993-03-30 | Trw Inc. | Laser anti-missle defense system |
US5907485A (en) * | 1995-03-31 | 1999-05-25 | Sun Microsystems, Inc. | Method and apparatus for flow control in packet-switched computer system |
US6611521B1 (en) * | 1998-07-14 | 2003-08-26 | International Business Machines Corporation | Data link layer extensions to a high latency wireless MAC protocol |
US6594268B1 (en) * | 1999-03-11 | 2003-07-15 | Lucent Technologies Inc. | Adaptive routing system and method for QOS packet networks |
US6834037B2 (en) | 2000-03-10 | 2004-12-21 | Telefonaktiebolaget Lm Ericsson | Method and arrangement in a telecommunication system |
US20020118644A1 (en) * | 2000-09-01 | 2002-08-29 | Ian Moir | Method and system to implement policy-based network traffic management |
US20020032793A1 (en) * | 2000-09-08 | 2002-03-14 | The Regents Of The University Of Michigan | Method and system for reconstructing a path taken by undesirable network traffic through a computer network from a source of the traffic |
US20020032854A1 (en) * | 2000-09-12 | 2002-03-14 | Chen Eric Yi-Hua | Distributed denial of service attack defense method and device |
WO2002025402A2 (en) | 2000-09-20 | 2002-03-28 | Bbnt Solutions Llc | Systems and methods that protect networks and devices against denial of service attacks |
US7301899B2 (en) * | 2001-01-31 | 2007-11-27 | Comverse Ltd. | Prevention of bandwidth congestion in a denial of service or other internet-based attack |
US20020138599A1 (en) * | 2001-03-21 | 2002-09-26 | Mark Dilman | Method and apparatus for efficient Reactive monitoring |
WO2003001333A2 (en) | 2001-06-20 | 2003-01-03 | Arbor Networks, Inc., | Detecting network misuse |
WO2003005666A2 (en) | 2001-07-03 | 2003-01-16 | Intel Corporation | An apparatus and method for secure, automated response to distributed denial of service attacks |
US20030037141A1 (en) | 2001-08-16 | 2003-02-20 | Gary Milo | Heuristic profiler software features |
US7197009B1 (en) * | 2002-03-06 | 2007-03-27 | Sprint Communications Company L.P. | Delay variation based routing in communication systems |
US20040054925A1 (en) * | 2002-09-13 | 2004-03-18 | Cyber Operations, Llc | System and method for detecting and countering a network attack |
US20060156407A1 (en) | 2002-09-30 | 2006-07-13 | Cummins Fred A | Computer model of security risks |
US20060174130A1 (en) | 2003-06-28 | 2006-08-03 | Noble Gary P | Identification system and method |
US20050050364A1 (en) * | 2003-08-26 | 2005-03-03 | Wu-Chang Feng | System and methods for protecting against denial of service attacks |
US20050157647A1 (en) * | 2004-01-21 | 2005-07-21 | Alcatel | Metering packet flows for limiting effects of denial of service attacks |
US20050216955A1 (en) * | 2004-03-25 | 2005-09-29 | Microsoft Corporation | Security attack detection and defense |
US20060077964A1 (en) * | 2004-10-07 | 2006-04-13 | Santera Systems, Inc. | Methods and systems for automatic denial of service protection in an IP device |
US20060098585A1 (en) * | 2004-11-09 | 2006-05-11 | Cisco Technology, Inc. | Detecting malicious attacks using network behavior and header analysis |
Non-Patent Citations (4)
Title |
---|
Argyraki, K. et al., "Active Internet Trafice Filtering: Real-Time Response to Denial-of-Service Attacks," USENIX Association, 2005 USENIX Annual Technical Conference, pp. 135-148, Apr. 10, 2005. |
Lakshminarayanan, K. et al., "Taming IP Packet Flooding Attacks," ACM SIGCOMM Computer Communication Review, vol. 34, Issue 1 (Jan. 2004), Column: Papers from Hotnets-II, pp. 45-50, 2004. |
Marques, P. et al., "Dissemination of flow specification rules", IETF Internet Draft draft-marques-idr-flow-spec-02.txt, Dec. 2004. |
PCT International Search Report dated Aug. 12, 2006. |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130263256A1 (en) * | 2010-12-29 | 2013-10-03 | Andrew B. Dickinson | Techniques for protecting against denial of service attacks near the source |
US8966622B2 (en) * | 2010-12-29 | 2015-02-24 | Amazon Technologies, Inc. | Techniques for protecting against denial of service attacks near the source |
Also Published As
Publication number | Publication date |
---|---|
JP4768021B2 (en) | 2011-09-07 |
WO2007019213A1 (en) | 2007-02-15 |
KR20080028381A (en) | 2008-03-31 |
JP2009504100A (en) | 2009-01-29 |
CN101213812B (en) | 2011-08-03 |
EP1911243A1 (en) | 2008-04-16 |
US20070030850A1 (en) | 2007-02-08 |
ATE544283T1 (en) | 2012-02-15 |
CN101213812A (en) | 2008-07-02 |
KR101217647B1 (en) | 2013-01-02 |
EP1911243B1 (en) | 2012-02-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP1911243B1 (en) | Method for defending against denial of service attacks in ip networks by target victim self-identification and control | |
EP1911241B9 (en) | Method for defending against denial of service attacks in ip networks by target victim self-identification and control | |
CN101136922B (en) | Service stream recognizing method, device and distributed refusal service attack defending method, system | |
US7451489B2 (en) | Active network defense system and method | |
EP2095604B1 (en) | Methods and apparatus for detecting unwanted traffic in one or more packet networks utilizing string analysis | |
US20030065943A1 (en) | Method and apparatus for recognizing and reacting to denial of service attacks on a computerized network | |
US20040187032A1 (en) | Method, data carrier, computer system and computer progamme for the identification and defence of attacks in server of network service providers and operators | |
US20060075491A1 (en) | Network overload detection and mitigation system and method | |
JP4774307B2 (en) | Unauthorized access monitoring device and packet relay device | |
US20030037141A1 (en) | Heuristic profiler software features | |
WO2005112317A2 (en) | Methods and apparatus for computer network security using intrusion detection and prevention | |
WO2004095281A2 (en) | System and method for network quality of service protection on security breach detection | |
Razumov et al. | Developing of algorithm of HTTP FLOOD DDoS protection | |
KR101006372B1 (en) | Hazardous Traffic Isolation System and Methods | |
US20080109902A1 (en) | Methods and apparatus for overriding denunciations of unwanted traffic in one or more packet networks | |
Mavrommatis | Confronting and intrusion detection techniques of cyber-attacks in wired and wireless communication networks | |
JP2006501527A (en) | Method, data carrier, computer system, and computer program for identifying and defending attacks against server systems of network service providers and operators | |
US20030037260A1 (en) | Heuristic profiler for packet screening | |
Khan | Critical Study and Survey of IDS form Malicious Activities using SNORT | |
JP2004363915A (en) | DoS ATTACH COUNTERMEASURE SYSTEM, METHOD, AND PROGRAM | |
Chen et al. | NETWORK TERM PROJECT SONY HACK OR DDOS | |
ZA200400908B (en) | Method, data-carrier, computer system and computer programme for the identification and defence of attacks on server systems of network service providers and operators. | |
IL160123A (en) | Method, data carrier, computer system and computer programme for the identification and defence of attacks on server systems of network service providers and operators |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: LUCENT TECHNOLOGIES INC., NEW JERSEY Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:GROSSE, ERIC HENRY;REEL/FRAME:016825/0972 Effective date: 20050805 |
|
FEPP | Fee payment procedure |
Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
AS | Assignment |
Owner name: ALCATEL-LUCENT USA INC., NEW JERSEY Free format text: MERGER;ASSIGNOR:LUCENT TECHNOLOGIES INC.;REEL/FRAME:025537/0629 Effective date: 20081101 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
AS | Assignment |
Owner name: CREDIT SUISSE AG, NEW YORK Free format text: SECURITY INTEREST;ASSIGNOR:ALCATEL-LUCENT USA INC.;REEL/FRAME:030510/0627 Effective date: 20130130 |
|
FPAY | Fee payment |
Year of fee payment: 4 |
|
AS | Assignment |
Owner name: ALCATEL-LUCENT USA INC., NEW JERSEY Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG;REEL/FRAME:033950/0001 Effective date: 20140819 |
|
AS | Assignment |
Owner name: PROVENANCE ASSET GROUP LLC, CONNECTICUT Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:NOKIA TECHNOLOGIES OY;NOKIA SOLUTIONS AND NETWORKS BV;ALCATEL LUCENT SAS;REEL/FRAME:043877/0001 Effective date: 20170912 Owner name: NOKIA USA INC., CALIFORNIA Free format text: SECURITY INTEREST;ASSIGNORS:PROVENANCE ASSET GROUP HOLDINGS, LLC;PROVENANCE ASSET GROUP LLC;REEL/FRAME:043879/0001 Effective date: 20170913 Owner name: CORTLAND CAPITAL MARKET SERVICES, LLC, ILLINOIS Free format text: SECURITY INTEREST;ASSIGNORS:PROVENANCE ASSET GROUP HOLDINGS, LLC;PROVENANCE ASSET GROUP, LLC;REEL/FRAME:043967/0001 Effective date: 20170913 |
|
FEPP | Fee payment procedure |
Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
FEPP | Fee payment procedure |
Free format text: 7.5 YR SURCHARGE - LATE PMT W/IN 6 MO, LARGE ENTITY (ORIGINAL EVENT CODE: M1555); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 8 |
|
AS | Assignment |
Owner name: NOKIA US HOLDINGS INC., NEW JERSEY Free format text: ASSIGNMENT AND ASSUMPTION AGREEMENT;ASSIGNOR:NOKIA USA INC.;REEL/FRAME:048370/0682 Effective date: 20181220 |
|
AS | Assignment |
Owner name: PROVENANCE ASSET GROUP LLC, CONNECTICUT Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CORTLAND CAPITAL MARKETS SERVICES LLC;REEL/FRAME:058983/0104 Effective date: 20211101 Owner name: PROVENANCE ASSET GROUP HOLDINGS LLC, CONNECTICUT Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CORTLAND CAPITAL MARKETS SERVICES LLC;REEL/FRAME:058983/0104 Effective date: 20211101 Owner name: PROVENANCE ASSET GROUP LLC, CONNECTICUT Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:NOKIA US HOLDINGS INC.;REEL/FRAME:058363/0723 Effective date: 20211129 Owner name: PROVENANCE ASSET GROUP HOLDINGS LLC, CONNECTICUT Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:NOKIA US HOLDINGS INC.;REEL/FRAME:058363/0723 Effective date: 20211129 |
|
AS | Assignment |
Owner name: RPX CORPORATION, CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:PROVENANCE ASSET GROUP LLC;REEL/FRAME:059352/0001 Effective date: 20211129 |
|
FEPP | Fee payment procedure |
Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
LAPS | Lapse for failure to pay maintenance fees |
Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
STCH | Information on status: patent discontinuation |
Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362 |
|
FP | Lapsed due to failure to pay maintenance fee |
Effective date: 20230215 |